Exam 8: Desktop and Server Os Vulnerabilities
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
What is Server Message Block (SMB)used for in Windows and can a hacker still damage a network using SMB?
(Essay)
4.9/5
(42)
When using the Common Internet File System (CIFS),which security model will require network users to have a user name and password to access a specific resource?
(Multiple Choice)
4.7/5
(40)
When using the Common Internet File System (CIFS),which security model does not require a password to be set for the file share?
(Multiple Choice)
5.0/5
(36)
Why should you review logs regularly,and how should you manage this task?
(Essay)
4.8/5
(41)
Match each item with a statement below.
-An interprocess communication mechanism that allows a program running on one host to run code on a remote host
(Multiple Choice)
4.9/5
(32)
For a Windows computer to be able to access a *nix resource,which of the following must be enabled on both systems?
(Multiple Choice)
4.9/5
(31)
Windows Software Update Services (WSUS)is designed to manage patching and updating system software from the network.
(True/False)
4.9/5
(31)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)